You are on page 1of 10

COMPUTER SYSTEMS SERVICING 10

Network Security

Edelmar G. Benosa
BACKGROUND INFORMATION FOR
LEARNERS
Computer and network security help keep data and
equipment safe by giving only the appropriate people
access. Everyone in an organization should give high
priority to security, because everyone can be affected
by a lapse in security. Theft, loss, network intrusion,
and physical damage are some of the ways a network
or computer can be harmed.
BACKGROUND INFORMATION FOR
LEARNERS
A technician’s primary responsibilities include data and network security.
You may have to repair, adjust, and install equipment. You need to know
how to configure settings to keep the network secure, but still keep it
available to those who need to access it. You will ensure that software
patches and updates are applied, antivirus software is installed, and
antispyware software is used. You may also be asked to instruct users on how
to maintain good security practices with computer equipment.
01
Security Attacks
 Physical: Events or attacks that steal, damage,
or destroy such equipment as servers,
switches, and wiring.
 Data: Events or attacks that remove, corrupt,
deny access to, allow access to, or steal
information.
Threats to security can come from
inside or outside an organization, and
the level of potential damage can vary
greatly. Potential threats include the
following:
 Internal: Employees who have access to data,
equipment, and the network. Internal attacks can be
characterized as follows:
• Malicious threats are when an employee intends
to cause damage.
• Accidental threats are when the user damages
data or equipment unintentionally.
 External: Users outside an organization who do not
have authorized access to the network or resources.
External attacks can be characterized as follows:
• Unstructured attacks, which use available
resources, such as passwords or scripts, to gain
access to and run programs designed to vandalize.
• Structured attacks, which use code to access
operating systems and software.
02
Types of Malware
• Virus is attached to small pieces of computer code, software,
or document. The virus executes when the software runs on a
computer.
• Worm is a self-replicating program that is harmful to
networks. A worm uses the network to duplicate its code to
the hosts on a network, often without any user intervention.
• Trojan horse technically is a worm. It does not need to be
attached to other software. Instead, a Trojan threat is hidden
in software that appears to do one thing, and yet behind the
scenes it does another.

You might also like